Home | Amazing | Today | Tags | Publishers | Years | Search 
Rapid GUI Programming with Python and Qt (Prentice Hall Open Source Software Development)
Rapid GUI Programming with Python and Qt (Prentice Hall Open Source Software Development)

The Insider's Best-Practice Guide to Rapid PyQt 4 GUI Development

Whether you're building GUI prototypes or full-fledged cross-platform GUI applications with native look-and-feel, PyQt 4 is your fastest, easiest, most powerful solution. Qt expert Mark Summerfield has written the definitive best-practice guide to PyQt 4...

A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

The Book of Qt 4: The Art of Building Qt Applications
The Book of Qt 4: The Art of Building Qt Applications
Cross-platform development is a kind of holy grail, and Trolltech's Qt toolkit may well be the most promising solution yet to this development challenge. Qt is widely used for the development of GUI applications as well as console tools and servers, and it's especially appealing to programmers who need to write cross-platform applications to run on...
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
The goal of this book is to teach computational scientists how to develop tailored, flexible, and human-efficient working environments built from small programs (scripts) written in the easy-to-learn, high-level language Python. The focus is on examples and applications of relevance to computational scientists: gluing existing applications and...
E-Commerce: A Control and Security Guide
E-Commerce: A Control and Security Guide

Once scoffed at during the dot.com year, the formerly staid, old, “brick and mortar” companies have now fully recognized and implemented the value of the Internet. Their new online infrastructure allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and mortar” is now “brick and...

Developing and Porting C and C++ Applications on Aix
Developing and Porting C and C++ Applications on Aix

This IBM Redbook will help experienced UNIX application developers who are new to the AIX operating system. The book explains the many concepts in detail, including the following:

  • Enhancements and new features provided by the latest C and C++ compilers for AIX
  • Compiling and linking tasks required to effectively...
Practical Programming in Tcl and Tk (4th Edition)
Practical Programming in Tcl and Tk (4th Edition)

Tcl stands for Tool Command Language. Tcl is really two things: a scripting language, and an interpreter for that language that is designed to be easy to embed into your application. Tcl and its associated graphical user-interface toolkit, Tk, were designed and...

Special Edition Using Mac OS X Leopard
Special Edition Using Mac OS X Leopard
SPECIAL EDITION USING MAC OS X LEOPARD

 

THE ONLY MAC OS X LEOPARD BOOK YOU NEED

 

We crafted this book to grow with you, providing the reference material you need as...

Oracle Database 11g: New Features for DBAs and Developers (Expert's Voice in Oracle)
Oracle Database 11g: New Features for DBAs and Developers (Expert's Voice in Oracle)
Oracle Database 11g: New Features for DBAs and Developers is a comprehensive, example–laden review of the most significant new features and improvements offered by the latest release of Oracle Corporation’s flagship database product.
  • Learn what’s new in Oracle that really counts.
  • See actual...
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Pulling Strings with Puppet: Configuration Management Made Easy
Pulling Strings with Puppet: Configuration Management Made Easy
Competent system administrators know their success hinges upon being able to perform often tedious tasks with rigor and punctuality. Such metrics are often achieved only by instituting a considerable degree of automation, something that has become even more crucial as IT environments continue to scale both in terms of size and complexity. One of...
Pro Windows PowerShell
Pro Windows PowerShell
I remember the first time I got to play with Windows PowerShell—I had some spare time on my hands, and after reading a blog post, I quickly set off to download the unofficial pre-release bits that were available at the time. I originally had very low expectations about the tool—all I wanted was a shell that is up to par with its UNIX...
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy